Open Access iconOpen Access



Integrity Assurance Method of Multi-Keyword Query for Encrypted Outsourced Data

Ling Wang1, Shan Ji2, Zhaokang Wang3, Xiaowan Wang4,*, Ghulam Mohiuddin5, Yongjun Ren1

1 Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer Science, Nanjing University of Information Science & Technology, Nanjing, 210044, China
2 Zhengde Polytechnic, Nanjing, 211106, China
3 Nanjing University of Aeronautics and Astronautics, Nanjing, 210008, China
4 Xi’an University of Posts & Telecommunications, Xi’an, 710061, China
5 Department of Cyber Security at VaporVM, Abu Dhabi, 999041, United Arab Emirates

* Corresponding Author: Xiaowan Wang. Email: email

Intelligent Automation & Soft Computing 2022, 34(1), 221-234.


As the data scale exceeds the petabyte level, more and more users outsource their local databases to third-party service providers to save local storage costs and avoid cumbersome local data management. However, because third-party service providers are not fully trusted, they may leak outsourced data and bring security risks to the personal privacy of data users. The service provider may also return incorrect or incomplete query results to the data user. Therefore, in this paper, we propose a Lightweight and Verifiable Multi-keyword Query Scheme for the integrity verification of multi-keyword query of outsourced data. This scheme supports multi-keyword query integrity verification and does not require a third-party auditor, combining a hash-based accumulator that provides correctness verification and a cuckoo filter that provides integrity verification to form a provably secure composite verification structure, and at the same time, it uses controllable Paillier encryption to support data update operations. This scheme strikes a balance between the cost of verification structure generation, verification object generation, and proof verification cost to enable data users to perform secure multi-keyword query while efficiently verifying the integrity of query results. The security proof and the performance analysis show that the proposed scheme is secure and efficient for practical deployment.


Cite This Article

APA Style
Wang, L., Ji, S., Wang, Z., Wang, X., Mohiuddin, G. et al. (2022). Integrity assurance method of multi-keyword query for encrypted outsourced data. Intelligent Automation & Soft Computing, 34(1), 221-234.
Vancouver Style
Wang L, Ji S, Wang Z, Wang X, Mohiuddin G, Ren Y. Integrity assurance method of multi-keyword query for encrypted outsourced data. Intell Automat Soft Comput . 2022;34(1):221-234
IEEE Style
L. Wang, S. Ji, Z. Wang, X. Wang, G. Mohiuddin, and Y. Ren "Integrity Assurance Method of Multi-Keyword Query for Encrypted Outsourced Data," Intell. Automat. Soft Comput. , vol. 34, no. 1, pp. 221-234. 2022.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1214


  • 682


  • 0


Share Link